Intrusion Detection with Neural Networks Based on Knowledge Extraction by Decision Tree

被引:1
作者
Guevara, Cesar [1 ]
Santos, Matilde [1 ]
Lopez, Victoria [1 ]
机构
[1] Univ Complutense Madrid, Dept Comp Architecture & Automat Control, E-28040 Madrid, Spain
来源
INTERNATIONAL JOINT CONFERENCE SOCO'16- CISIS'16-ICEUTE'16 | 2017年 / 527卷
关键词
Intrusion detection; Pattern recognition; Behavioral profile; Security; Decision tree; Neural networks;
D O I
10.1007/978-3-319-47364-2_49
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Detection of intruders or unauthorized access to computers has always been critical when dealing with information systems, where security, integrity and privacy are key issues. Although more and more sophisticated and efficient detection strategies are being developed and implemented, both hardware and software, there is still the necessity of improving them to completely eradicate illegitimate access. The purpose of this paper is to show how soft computing techniques can be used to identify unauthorized access to computers. Advanced data analysis is first applied to obtain a qualitative approach to the data. Decision tree are used to obtain users' behavior patterns. Neural networks are then chosen as classifiers to identify intrusion detection. The result obtained applying this combination of intelligent techniques on real data is encouraging.
引用
收藏
页码:508 / 517
页数:10
相关论文
共 13 条
[1]   A novel SVM-kNN-PSO ensemble method for intrusion detection system [J].
Aburomman, Abdulla Amin ;
Reaz, Mamun Bin Ibne .
APPLIED SOFT COMPUTING, 2016, 38 :360-372
[2]   A comparative study on the currently existing intrusion detection systems [J].
Ahmed, Martuza ;
Pal, Rima ;
Hossain, Md. Mojammel ;
Bikas, Md. Abu Naser ;
Hasan, Md. Khalad .
IACSIT-SC 2009: INTERNATIONAL ASSOCIATION OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY - SPRING CONFERENCE, 2009, :151-154
[3]  
Amudhavel J., 2016, INDIAN J SCI TECHNOL, V9, P1
[4]  
[Anonymous], 2015, P IEEE C INF KNOWL T
[5]   Hybrid flexible neural-tree-based intrusion detection systems [J].
Chen, Yuehui ;
Akbraham, Ajith ;
Yang, Bo .
INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2007, 22 (04) :337-352
[6]  
Guevara C., 2014, RES ATT INTR DEF 17, V8688, P477
[7]   Negative Selection and Knuth Morris Pratt Algorithm for Anomaly Detection [J].
Guevara, C. B. ;
Santos, M. ;
Lopez, V. .
IEEE LATIN AMERICA TRANSACTIONS, 2016, 14 (03) :1473-1479
[8]  
Haq Nutan Farah, 2015, International Journal of Advanced Research in Artificial Intelligence, V4, P9
[9]   A hierarchical intrusion detection model based on the PCA neural networks [J].
Liu, Guisong ;
Yi, Zhang ;
Yang, Shangming .
NEUROCOMPUTING, 2007, 70 (7-9) :1561-1568
[10]  
Prakash P.O., 2016, International Journal of Applied Engineering Research, V11, P6278